[GF-Users] tlsrpt-reporter and SELinux (was: GF10 is now released!)

Peter peter at pajamian.dhs.org
Tue Aug 26 20:42:46 MST 2025


I pushed out some new tlsrpt-reporter packages to the gf-testing repo. 
Due to the scope of the changes I didn't want to push them out to the 
main repo until I know that the changes work and don't break anything. 
There are now three packages total:

tlsrpt-reporter - This is now a meta-package that doesn't actually 
install anything itself but contains tlsrpt-reporter-core and 
tlsrpt-reporter-selinux as dependancies.

tlsrpt-reporter-core - This now contains everything that tlsrpt-reporter 
used to contain, so if you want to install tlsrpt-reporter without the 
selinux policies you can just install this package.

tlsrpt-reporter-selinux - This will install the selinux policies to 
allow postfix to connect to the tlsrpt-reporter sockets.

To install or update to this new release:

dnf --enablerepo=gf-testing install tlsrpt-reporter

Please let me know if this fixes the selinux issues, or if not, can you 
share a copy of the new denials from audit.log?


Peter


On 24/08/25 15:25, Peter wrote:
> I recall I was going to do something about the systemd issue but it fell
> through the cracks.  The last thing I came up with which I believe is
> the appropriate remedy is as follows:
> 
>> Create a new selinux type: system_u:object_r:tlsrpt_var_run_t and set
>> context for /var/run/tlsrpt to that type.
>>
>> Create a new policy allowing write and sendto for postfix_smtp_t to
>> tlsrpt_var_run_t.
>>
>> That should allow postfix to access the socket properly without blowing
>> out access to a bunch of other files as well.
> 
> I'm thinking of actually doing this from a separate package
> (tlsrpt-reporter-selinux-policies) and setting that as a "Recommends"
> for the tlsrpt-reporter.  This way people are not forced to install the
> selinux policies if they have another solution in mind.
> 
> 
> Peter


More information about the users mailing list